Internet-Draft Hybrid-Function-Chain (HFC) Framework March 2026
Yuan & Zhang Expires 3 September 2026 [Page]
Workgroup:
rtgwg
Internet-Draft:
draft-yuan-rtgwg-hfc-framework-02
Published:
Intended Status:
Standards Track
Expires:
Authors:
D. Yuan
ZTE Corporation
Y. Zhang
China Unicom

Hybrid-Function-Chain (HFC) Framework

Abstract

With the maturity of cloud native application development, applications can be decomposed into finer grained atomic services. On the other hand, as a distributed computing paradigm, fine grained micro-services could be deployed and implemented in a distributive way among edges to make computing, storage and run-time processing capabilities as close to users as possible to provide satisfied QoE. Under the circumstances analyzed, a Hybrid-Function-Chain (HFC) framework is proposed in this draft, aiming to wisely allocate and schedule resources and services in order to provide consistent end- to-end service provisioning.

Status of This Memo

This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.

Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.

Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."

This Internet-Draft will expire on 3 September 2026.

Table of Contents

1. Brief Introduction of HFC

In the context of cloud native, applications are often no longer provided in the form of monolithic services, but are decomposed into a series of cloud native services deployed in distributed clusters, with inter-connections and joint provision to the outer side.

Traffic lanes, for instance, have emerged and been commonly used for environmental isolation and traffic control of the entire request chain of services for grayscale publishing scenarios, would be reckoned as a typical example for Hybrid-Function-Chain (HFC). In fact, the creation of traffic lanes is still executed by various existing network API configurations of the cluster. The service routes are always configured in the cluster and identified endpoints under a service name to implement various scheduling strategies and perform load balancing schemes among multiple optional instances.

Edge computing, as a distributed computing paradigm, the core idea is to make computing, storage and service processing as close to the clients and customers as possible to reduce latency, improve response speed and enhance data security. When applications are further deconstructed into atomic services as analyzed previously, service inter-connections MAY not only exist in adjacent clusters deployed in a same edge, but also happen with network paths connecting remote edge data centers. Thus, incremental requirements would be raised correspondingly. Relevant use cases and requirements are discussed in [I-D.huang-rtgwg-us-standalone-sid].

Correspondingly, this draft proposes a Hybrid Function Chain (HFC) architecture aimed at providing end-to-end and consistent service provisioning capabilities which includes multiple service endpoints and corresponding connected network paths. Compared to conventional schemes and patterns, HFC is granted with multiple features and connotations.

              Step 1
               ----
              ( -- )
-----------> ( (  ) )
Request     (   --   )
             -------- \                                  +---+
                       \                                (     )
                        \     Step 2         Step 3  +--       +
                         \     ----                 (           )
                          \   ( -- )               (  --  --     )
                           V ( (  ) )            (   (  )(  )     )
                            (   --   )<--------->(    --  --  ... )
                           / --------             (              )
                          /                        +------------+
                         /
              Step 4    /
               ----    /
              ( -- )  /
<----------- ( (  ) )V
            (   --   )
             --------

                Edge Clusters/Clouds

                  Figure 1: HFC across Multi-edges

Based on the concepts of HFC proposed here, this draft further analyzes HFC framework and deconstructs it into several planes with incremental functions and features based on conventional network and service mesh techniques.

2. Conventions Used in This Document

2.1. Abbreviations

  1. Terminology

  • HFC: Hybrid Function Chain.

  • SFC: Service Function Chain.

  • QoE: Quality of Experience.

  • SLA: Service Level Agreement.

  • SRv6: Segment Routing over IPv6.

  • OAM: Operation, Administration and Maintenance.

  • APM: Application Performance Management.

2.2. Requirements Language

The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here.

3. problem statement

3.1. problem 1: dynamically service instances management

In cloud-native architectures, atomic service capabilities are typically deployed as virtualized applications across distributed cloud nodes, managed via container orchestration systems. Service Mesh has emerged as a predominant framework for distributed service management. In standard deployments, the Service Mesh control plane maintains visibility of service instances across multi-domain environments by storing and managing stateful records of Endpoint IP addresses. However, in cloud-native and edge computing scenarios, service instances representing atomic capabilities are dynamically instantiated and terminated across a vast number of edge nodes. This volatile behavior imposes significant overhead on the management plane. Every lifecycle event of a service instance (registration or deregistration) necessitates frequent updates to the centralized or distributed service registry. Furthermore, for the execution of Service Chaining at the application layer, if atomic services are concatenated solely based on IP identifiers, the Service Mesh infrastructure must guarantee continuous accuracy of these dynamic Endpoints. Given the potential for millions of concurrent, short-lived microservice events across the network, the resource requirements for maintaining such a high-frequency update state become a critical bottleneck for server-side management entities.

3.2. problem 2: service routing determination without network state awaring/Limitations of Current Service Scheduling

Current microservice scheduling mechanisms, particularly in cross- cluster scenarios (e.g., Service Mesh architectures), primarily rely on the Control Plane to determine service routing for endpoints. These routing decisions are typically enforced through static configurations of target services across clusters via network APIs. However, a significant gap exists because the Service Mesh Control Plane lacks real-time visibility into the underlying network connectivity states between distributed services. In environments with redundant service instances, the originating endpoint remains unaware of potential differentiated service chains that may exist in the data plane. Consequently, the system cannot leverage optimized scheduling heuristics to select the most efficient path. This lack of dynamic, network-aware path selection prevents the infrastructure from providing deterministic end-to-end Service Level Agreement (SLA) guarantees.

3.3. problem 3: consistent end-end SLA guarantee

In traditional Layer 3 (L3) Service Function Chaining (SFC), packets traversing various Service Function (SF) endpoints are processed without terminating the underlying transport protocol. Consequently, the essential attributes and metadata of the packet are preserved across the chain, allowing for the consistent enforcement of the original steering and scheduling policies. Conversely, in Layer 7 (L7) service chain processing, the application-layer proxy or service instance terminates the incoming packet entirely upon reception. Following the execution of local service logic, a new packet is generated and encapsulated for transmission to the subsequent service node. This termination results in the loss of original flow context and scheduling metadata. As a result, the initial scheduling policy cannot be transparently reapplied to the newly instantiated packet, leading to a fragmentation of the control logic. This architectural limitation manifests as a lack of cohesive, end-to-end scheduling consistency across the entire service path.

4. Hybrid-Function-Chain use case

4.1. case 1: Traffic lane used in RAG service chain over multiple clusters

In an enterprise-grade global intelligent Q&A platform, the core RAG service is decomposed into three sequentially executed microservices deployed across geographically distributed data centers: Service A (Retrieval Service), Service B (Prompt Synthesis Service), and Service C (LLM Generation Service). These three services form a complete service chain A -> B -> C. User query requests have differentiated requirements for the end-to-end performance of this entire chain based on business type: real-time conversations demand ultra-low latency, while in-depth analysis tolerates higher latency but requires guaranteed bandwidth for large-volume data transfer.

Scenario Description: To meet these differentiated requirements, the operations team utilizes the HFC framework to define two global, end-to-end traffic lane strategies. Each strategy specifies a unified resource and network SLA preference for the entire three-node service chain A->B->C:

1) Low-Latency Chain Lane (low-latency-chain): Designed for real-time conversations. Policy Requirement: The end-to-end processing latency of the service chain A->B->C must be under 300 milliseconds. Therefore, this lane policy mandates: a) Service Instance Selection: Priority scheduling to lightweight instances of Services A, B, and C deployed in edge clusters closest to the user. b) Network Path Requirement: All inter-node network connections between Service A and Service B, and between Service B and Service C (whether cross-cluster or not), must use low-latency dedicated network links.

2) High-Throughput Chain Lane (high-throughput-chain): Designed for in-depth analysis. Policy Requirement: The service chain needs to process and transmit large volumes of retrieved context and generated content. Therefore, this lane policy mandates: a) Service Instance Selection: Can be scheduled to more powerful instances of Service B and Service C (possibly located in core data centers) capable of handling large contexts. b) Network Path Requirement: All network connections between Service A and B, and between B and C, are allocated high-bandwidth, high-throughput, cost-effective backbone network links to ensure efficient transmission of large data packets.

End-to-End Orchestration Flow under the HFC Framework:

1) Traffic Identification and Tagging: The API Gateway in City-A identifies the service type based on request characteristics (e.g., path or headers) and marks the request with the corresponding HFC lane identifier, e.g., x-hfc-chain-sla: low-latency.

2) Unified Path Calculation: The HFC Control Plane, upon receiving the tagged request, treats it as an integral chain requiring sequential execution of A->B->C. Based on the lane policy and real-time resource status, the control plane calculates a complete path covering all three service nodes and the network segments between them in one go. Every hop of this path (A instance, A-B network link, B instance, B-C network link, C instance) adheres to the SLA requirements of that lane.

3) Chained Path Encapsulation and Execution: The HFC Control Plane delivers the calculated complete path (likely encoded as an SRv6 Segment List containing multiple service SIDs and network SIDs) to the HFC Gateway in City-A. The gateway encapsulates this path into the outbound packet.

  • Traffic is first directed to the lane-specified Service A instance.

  • After Service A completes processing, its HFC proxy, following the path information in the packet, steers the traffic via the specified low-latency or high-bandwidth link to the Service B instance.

  • After Service B completes processing, its HFC proxy similarly guides the traffic to the Service C instance via the specified next-hop link based on the path information.

4) Full-Chain Observability and Assurance: HFC's observability system tracks the request's entire journey through A ->(A-B network) - B -> (B-C network) -> C, collecting metrics at each stage to verify whether the entire chain meets the preset end-to-end SLA objectives.

In this manner, the HFC framework ensures that the complete path from the first service node to the last conforms to the network transmission quality required by the business, achieving fine-grained, SLA-aware global traffic governance for chained microservice architectures.

5. Hybrid-Function-Chain (HFC) Framework

Hybrid-Function-Chain (HFC) framework generally includes administration plane, control plane and forwarding plane. Based on conventional framework of network and cloud native practices, several incremental functions and features are added and deployed.

               +----------+ +-----------+ +---------+
               | AR/VR/XR | | Metaverse | | ....... |
               +----------+ +-----------+ +---------+ ----------------------------------------------------------------------------- Administration     +------------------------------------+ Plane              |    Service Analysis & Operation    |
               +------------------------------------+
               +------------------------------------+
               |    Service Evaluation & Modeling   |
               +------------------------------------+
               +------------------------------------+
               | Service Scheduling & Orchestration |
               +------------------------------------+ ----------------------------------------------------------------------------- Control Plane +---------------+ +---------------------------------------+ +---------------+ |               | | Service Registration & Administration | |               | |K8S,           | +---------------------------------------+ |               | |Service Mesh   | +---------------------------------------+ |               | |(Istio)        | |    Service Discovery & Publication    | |               | |               | +---------------------------------------+ |               | |Galley, Pilot, | +---------------------------------------+ |               | |Mixer, Citadel | |Service Routes Calculation & Generation| |               | |               | +---------------------------------------+ |               | |    Cluster    | +---------------------------------------+ |    Network    | | Control Plane | |Service Inter-connection Configuration | | Control Plane | +---------------+ +---------------------------------------+ +---------------+ ----------------------------------------------------------------------------- Forwarding        +---------------------------------------+ Plane             | Service Identification Administration |
              +---------------------------------------+
              +---------------------------------------+
              |     Service Aware Traffic Steering    |
              +---------------------------------------+
              +---------------------------------------+
              | Service Provisioning & Observability  |
              +---------------------------------------+ -----------------------------------------------------------------------------


                   Figure 2: HFC Framework

5.1. Administration Plane

Service Analysis and Operation: The increasingly complex and diverse applications and services display different characteristics and features for outer users. In terms of orchestration for distributed micro-services, Service Analysis and Operation interprets the external and internal forms of overall applications and services as corresponding deconstruction patterns.

  • Deep learning: The overall deep learning process would be decomposed into several successive or related phases and steps, data pre-processing, model training, prediction and estimation, model evaluation based on rewards functions, data storage and API interactions for instance.

  • Live Broadcast: Relevant micro-services MAY include user authentication, live stream administration, live recording, online payment and data migration.

The above deconstructed microservices have serial, parallel, unidirectional, and bidirectional relationships, and their interconnection and collaboration are comprehensively presented as user and outer oriented applications.

Service Evaluation and Modeling: There are different and various resource requirements raised by multiple microservices, including but not limited to:

  • Computing resources and network capabilities: Computing-related services MAY be sensitive to computing resources, related indicators include CPU cores, available memories, floating number calculation. On the other hand, large amount of data transmission MAY be implemented between upstream and downstream services. Thus, the network connecting them would have to reserve sufficient bandwidth and provide abilities of low packet loss rate.

  • Constraints for inter-connection patterns: the inter-connection patterns between upstream and downstream services and functions MAY be classified as unidirectional, bidirectional, one-to-one and one-to-many. Furthermore, due to security concerns for instance, relevant services MAY be deployed at adjacent endpoints or a same edge center geographically.

                ----                   ----
               ( -- )                 ( -- )
              ( (  ) )-------------->( (  ) )
             (   --   )             (   --   )
              --------               --------
             Notification
                ----                   ----
               ( -- )                 ( -- )
              ( (  ) )<------------->( (  ) )
             (   --   )             (   --   )
              --------               --------
             Request and Response
                ----                   ----
               ( -- )                 ( -- )
              ( (  ) )-------------> ( (  ) )
             (   --   )     \       (   --   )
              --------       \       --------
                              \
                               \       ----
                                \     ( -- )
                                 --->( (  ) )
                                    (   --   )
                                     --------
             One-to-Many
                     +---+
                    (     )
                 +--       +
                (           )
               (  --     --  )
             (   (  )-->(  )--)------->
             (    --     --   )
              (              )
               +------------+
             Successive Services at same Location
    

    Figure 3: Inter-Connection between Services and Functions

Service Orchestration and Scheduling: Service administration would customize strategies or specific algorithms depending on circumstances of infrastructure and required proposals. Providing low-latency experiences or achieving load balance among available instances and resources SHOULD be selected as specific inclinations for further scheduling.

5.2. Control Plane

Service Registration and Administration: Based on the results and conclusions analyzed by Service Analysis and Operation, the overall service and included micro-services MAY be represented and administered by corresponding identifications. In this draft, Service IDs for micro-services and HFC IDs for HFC processes and services are generally defined. Therefore, HFCs and corresponding micro-services would be displayed and labeled in the control plane. Appropriate identifications would facilitate indicating the service traffic of the workflow.

                   ----
                  ( -- )
    -----------> ( (  ) )
                (   --   )    HFC ID,
                 -------- \   Service 1(Pre)
                 Service 1 \  Service 2(Next)
                            \
                             \     ----                 ----
                              \   ( -- )               ( -- )
                               v ( (  ) )             ( (  ) )
                                (   --   )<--------->(   --   )
                               / --------             --------
                              /  Service 2            Service 3
                             /
                            /
                   ----    /  HFC ID,
                  ( -- )  /   Service 2(Pre)
    <----------- ( (  ) )v    Service 4(Next)
                (   --   )
                 --------
                 Service 4



         Figure 4: Service Administration by Identification

Service Discovery and Publication: Depending existing and mature control plane protocols and interfaces, distributed services and capabilities of infrastructures SHOULD be able to be collected. Relevant schemes include extended IGP, BGP, BGP-LS, RESTful, Telemetry. The information learned in the control plane MAY include:

  • Computing resources related to services of specific instances.

  • Deployment of service instances or possible and scheduled resources utilization.

  • Network topology and corresponding TE capabilities.

Service Routes Calculation and Generation: Based on the information collected in Service Discovery and Publication, service routes would be calculated to determine appropriate instances and forwarding paths. Service Routes Calculation and Generation SHOULD follow the intentions identified in Service Orchestration and Scheduling. According to Service Registration and Administration, service routes could be distributed and indexed by HFC and service identifications.

Service Inter-connection Configuration: Within conventional schemes for services inter-connection, configurations would be disposed for endpoints distributed in multiple clusters. Istio, for instance, replys APIs including ServiceEntry, VirtualService and DestinationRules to describe inter-connections and relevant principles. Considering the framework of HFC proposed in this draft, service routes would be translated into corresponding configurations issued to clusters for revising API files.

5.3. Forwarding Plane

Service Identification Administration: Traffic would be able to be steered according to identifications distributed from the control plane. Also, the service identifications would inherit and re- generate from the previous ones in the workflow. Proxies, sidecars or gateways SHOULD be able to administer the inheritance and renewal relationship. Suppose an HFC application includes Service ID 1, ID 2 and ID 3, an identifier of {HFC, Service ID 2} implies that the successive function is expected to be Service ID 3. Correspondingly, the identifier would be modified as {HFC, Service ID 3}.

Service Aware Forwarding: Service routes entries would be distributed from the control plane and involved entities and devices would perform traffic forwarding accordingly. Relevant entries include:

  • Service aware forwarding entries for edges routers in which forwarding paths are indexed by HFC IDs and Service IDs.

  • Service identification administration entries for sidecars, proxies and gateways in which inheritance and correlations would be specified.

Service provisioning and observability: By implementing and performing OAM or APM schemes, forwarding plane would monitor the circumstances and performance of traffic flows. With detections of failures and possible degradations, forwarding plane would be able to support recovering, enhancing and provisioning for traffic flows.

6. SRv6-based HFC Implementation

Based on SRv6, forwarding paths orchestrated for an end-to-end HFC service including specific implementations would be able to be encoded in an SRH, in order to achieve consistent service provisioning across multiple endpoints deployed in distributed clusters and even edge clouds.

The overall paths would be explicitly indicated in the Segment List or be generally displayed. Correspondingly, a strict mode and a loose mode are proposed in this draft.

                                Service A Ins,Proxy
                                        +---+
                                       (     )
                                    +--       +
                                   (           )
                                  (  --     --  )
                                (   (  )---(  )  )
                                (    --     --   )
                                 (              ) +-----------+                         +------------+ |           |                                | |Application|                           +--------+ |           |      +--------------------|HFC GW A| |    GW     |     /                     +--------+ |           |    /                           | +-----------+   /   --------------+          |
  |        /                   \         |
  |       /                     +        |
  |      /                      |        |
  |     /                       |        |                 +---+
  |    /                        |        |                (     )
  |   /                         |        |             +--       +
  |  /                          |        |            (           )
  | /                           |        |           (  --     --  )   +--------+                        |   +--------+     (   (  )---(  )  )   | HFC GW |                        |   |HFC GW B|-----(    --     --   )   +--------+                        |   +--------+      (              )
    \                           +       /            +------------+
     \                         /       /           Service B Ins,Proxy
      \                       /       /
       \                     /       /
        \                   /       /
         \                 /       /
          \     <---------+       /
           \                     /
            \               +--------+      HFC Service
             +--------------|HFC GW C|      Operation Domain
                            +--------+
                                 |
                               +---+
                              (     )
                           +--       +
                          (           )
                         (  --     --  )
                       (   (  )---(  )  )
                       (    --     --   )
                        (              )
                         +------------+
                       Service C Ins,Proxy


         Figure 5: HFC Domain and end-to-end Delivery

In the above SRv6 based HFC implementation, several SRv6 SIDs MAY be generally defined in this draft:

Service A Ins,Proxy
        +---+
       (     )
    +--       +
   (           )
  (  --     --  )
(   (  )---(  )  )                                     +---+
(    --     --   )                                    (     )
 (              )                                  +--       +
  +------------+                                  (           )
         |                                       (  --     --  )
    +--------+                X+---------+     (   (  )---(  )  )
    |HFC GW A|-----------------|HFC GW B1|-----(    --     --   )
    +--------+ -----------+    +---------+    / (              )
                           \                 /   +------------+
    backup path             \               /  Service B Ins,Proxy
    and HFC GW               \ +---------+ /
    (with same inst)          \|HFC GW B2|/
                               +---------+

Service A Ins,Proxy
        +---+
       (     )
    +--       +
   (           )
  (  --     --  )
(   (  )---(  )  )                                      +---+
(    --     --   )                                     (     )
 (              )                                   +--       +
  +------------+                                   (           )
         |                                        (  --     --  )
    +--------+                 +---------+    X (   (  )---(  )  )
    |HFC GW A|-----------------|HFC GW B1|----- (    --     --   )
    +--------+ -----------+    +---------+       (              )
                           \                      +------------+
    backup path             \                     Service B Ins 1
    and HFC GW               \ +---------+
    (with different inst)     \|HFC GW B2|\             +---+
                               +---------+ \           (     )
                                            \       +--       +
                                             \     (           )
                                              \   (  --     --  )
                                               \(   (  )---(  )  )
                                                (    --     --   )
                                                 (              )
                                                  +------------+
                                                  Service B Ins 2


                      Figure 6: HFC Protection

Furthermore, SRv6 based HFC SHOULD support other features. For instance, backup paths would be orchestrated and accordingly configured at HFC GWs. End-to-end service observability would be achieved by distributed tracing and relevant schemes. More detailed implementation designs would be discussed in future works.

7. Security Considerations

To be discussed in future versions of this document.

8. Acknowledgements

TBA.

9. IANA Considerations

TBA.

10. Normative References

[I-D.huang-rtgwg-us-standalone-sid]
Huang, D., Liang, J., Yang, F., Zhang, Y., and D. Yang, "Use Cases-Standalone Service ID in Routing Network", Work in Progress, Internet-Draft, draft-huang-rtgwg-us-standalone-sid-01, , <https://datatracker.ietf.org/doc/html/draft-huang-rtgwg-us-standalone-sid-01>.
[RFC2119]
Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, DOI 10.17487/RFC2119, , <https://www.rfc-editor.org/rfc/rfc2119>.
[RFC8174]
Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, , <https://www.rfc-editor.org/rfc/rfc8174>.

Authors' Addresses

Dongyu Yuan
ZTE Corporation
Yan Zhang
China Unicom